Bitsight's Groma scanning engine maintains a continuous global survey of the public-facing Internet. Here you’ll find daily updates to an aggregated view of the Internet’s vendors, products, and vulnerabilities observed over the prior 30 days. These software observations are identified by an address, port, and domain name.
Software Product List
Browse Software by Product
13701 Products Found
| Product | Vendor | Observations Sort ascending |
|---|---|---|
| Kq75qb65afxkr | Samsung | 63 |
| Kq75qt80afxkr | Samsung | 63 |
| Ku75ub8000fxkr | Samsung | 63 |
| Ls32dm703ukxkr | Samsung | 63 |
| R6700 | NETGEAR | 63 |
| Rs2418\+ | Synology | 63 |
| Rs2418\+ Firmware | Synology | 63 |
| Sg300 20 | Cisco | 63 |
| Sg300 20 Firmware | Cisco | 63 |
| Ua43nu7100 | Samsung | 63 |
| Un49ru7100fxkr | Samsung | 63 |
| Un50j5500 | Samsung | 63 |
| Ey 6as80f021 Firmware | Sauter Controls | 63 |
| Ey As525f001 | Sauter Controls | 63 |
| Ey As525f001 Firmware | Sauter Controls | 63 |
| Un65u7900ffxza | Samsung | 63 |
| Tsp100iii | Starmicronics | 63 |
| Tsp100iii Firmware | Starmicronics | 63 |
| E1200 | Linksys Dd Wrt | 63 |
| E1200 Firmware | Linksys Dd Wrt | 63 |
- OpsShadowStrike claims attack on Lucrative Exim Consultants
- Access to Domain Admin rights for sale in Bosnia and Herzegovina
- OpsShadowStrike claims attack on Lucrative Exim Consultants
- TengkorakCyberCrew and collaborators claim attack on Lucrative Exim Consultants under #OpsShadowStrike
- Business Email Compromise service offered on underground forum
Your attack surface is expanding—know exactly how it looks
Reducing exposure starts with knowing exactly how your external attack surface stands—from your overall standing to each digital and cloud asset around the world. Bitsight's custom report gives you the insights you need to see your entire external attack surface.